File: ProfilerCodeAddressService.cpp

package info (click to toggle)
firefox 147.0.2-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,683,484 kB
  • sloc: cpp: 7,607,246; javascript: 6,533,185; ansic: 3,775,227; python: 1,415,393; xml: 634,561; asm: 438,951; java: 186,241; sh: 62,752; makefile: 18,079; objc: 13,092; perl: 12,808; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10; exp: 6
file content (74 lines) | stat: -rw-r--r-- 2,569 bytes parent folder | download | duplicates (12)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "ProfilerCodeAddressService.h"

#include "platform.h"
#include "mozilla/StackWalk.h"

using namespace mozilla;

#if defined(XP_LINUX) || defined(XP_FREEBSD)
static char* SearchSymbolTable(SymbolTable& aTable, uint32_t aOffset) {
  size_t index;
  bool exact =
      BinarySearch(aTable.mAddrs, 0, aTable.mAddrs.Length(), aOffset, &index);

  if (index == 0 && !exact) {
    // Our offset is before the first symbol in the table; no result.
    return nullptr;
  }

  // Extract the (mangled) symbol name out of the string table.
  auto strings = reinterpret_cast<char*>(aTable.mBuffer.Elements());
  nsCString symbol;
  symbol.Append(strings + aTable.mIndex[index - 1],
                aTable.mIndex[index] - aTable.mIndex[index - 1]);

  // First try demangling as a Rust identifier.
  char demangled[1024];
  if (!profiler_demangle_rust(symbol.get(), demangled, std::size(demangled))) {
    // Then as a C++ identifier.
    DemangleSymbol(symbol.get(), demangled, std::size(demangled));
  }
  demangled[std::size(demangled) - 1] = '\0';

  // Use the mangled name if we didn't successfully demangle.
  return strdup(demangled[0] != '\0' ? demangled : symbol.get());
}
#endif

bool ProfilerCodeAddressService::GetFunction(const void* aPc,
                                             nsACString& aResult) {
  Entry& entry = GetEntry(aPc);

#if defined(XP_LINUX) || defined(XP_FREEBSD)
  // On Linux, most symbols will not be found by the MozDescribeCodeAddress call
  // that GetEntry does.  So we read the symbol table directly from the ELF
  // image.

  // SymbolTable currently assumes library offsets will not be larger than
  // 4 GiB.
  if (entry.mLOffset <= 0xFFFFFFFF && !entry.mFunction) {
    auto p = mSymbolTables.lookupForAdd(entry.mLibrary);
    if (!p) {
      if (!mSymbolTables.add(p, entry.mLibrary, SymbolTable())) {
        MOZ_CRASH("ProfilerCodeAddressService OOM");
      }
      profiler_get_symbol_table(entry.mLibrary, nullptr, &p->value());
    }
    entry.mFunction =
        SearchSymbolTable(p->value(), static_cast<uint32_t>(entry.mLOffset));
  }
#endif

  if (!entry.mFunction || entry.mFunction[0] == '\0') {
    return false;
  }

  aResult = nsDependentCString(entry.mFunction);
  return true;
}